...
首页> 外文期刊>Journal of Engineering & Applied Sciences >Security Testing of Web Applications for Detecting and Exploiting Second-Order SQL Injection Vulnerabilities
【24h】

Security Testing of Web Applications for Detecting and Exploiting Second-Order SQL Injection Vulnerabilities

机译:用于检测和利用二阶SQL注入漏洞的Web应用程序的安全测试

获取原文
获取原文并翻译 | 示例
           

摘要

SQL injection is considered one of the most serious issues affecting web application's security. It occurs when an attacker tries to access the back-end database of web applications by exploiting improper user input validation vulnerabilities. There are two types of SQL injection, namely, first-order SQL injection and second-order SQL injection. Most of the existing research works addressing this issue focus on detecting the first-order SQL injection with a common assumption that preventing first-order injection attack makes web applications secure against other SQL injection attacks. However, second-order injection attacks can occur in applications that are secured against first-order injection attacks. This is a dangerous security problem which can occasionally, lead to dire consequences. In this study, we present our work-in-progress that uses a static taint analysis and symbolic execution approach for detecting second-order SQL injection vulnerabilities. We first use static taint analysis to identify candidate vulnerabilities. Then, we use symbolic execution to generate those input vectors that make the program execution satisfy conditions and confirm the existence of SQL injection vulnerabilities. This is the first technique of which we are aware that generates input vectors that expose second-order SQL injection vulnerabilities. The initial analysis of our proposed approach shows some promising results.
机译:SQL注入被认为是影响Web应用程序安全性的最严重问题之一。当攻击者尝试通过利用不正确的用户输入验证漏洞访问Web应用程序的后端数据库时发生。 SQL注入有两种类型,即一阶SQL注入和二阶SQL注入。现有的大多数研究作品解决了这个问题的关注检测一阶SQL注入,其具有常见假设,即防止一阶注入攻击使Web应用程序能够防止其他SQL注入攻击。然而,二阶注入攻击可能发生在针对一阶注入攻击的应用中。这是一个危险的安全问题,偶尔会导致可怕的后果。在这项研究中,我们介绍了我们的过程,它使用静态污染分析和符号执行方法来检测二阶SQL注入漏洞。我们首先使用静态Taint分析来识别候选漏洞。然后,我们使用符号执行来生成这些输入向量,使程序执行满足条件并确认存在SQL注入漏洞。这是我们知道的第一种技术,它会生成泄露二阶SQL注入漏洞的输入向量。我们提出的方法的初步分析显示了一些有希望的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号